Static task
static1
Behavioral task
behavioral1
Sample
33ab099d0a888a9ae66bcc8faf2b98f2d8563af2fe9685d34e65d66a37bd2437N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
33ab099d0a888a9ae66bcc8faf2b98f2d8563af2fe9685d34e65d66a37bd2437N.exe
Resource
win10v2004-20240802-en
General
-
Target
33ab099d0a888a9ae66bcc8faf2b98f2d8563af2fe9685d34e65d66a37bd2437N
-
Size
4.8MB
-
MD5
f66322db6fe702b505e10ca6644648e0
-
SHA1
811779d0adb77b80e164607858c87df2e7be0597
-
SHA256
33ab099d0a888a9ae66bcc8faf2b98f2d8563af2fe9685d34e65d66a37bd2437
-
SHA512
927dd10bacb668206f9f5088a71fc94a6c9fde8aa9690e61a9904019ba5c9c77631071410ebf5ce4648b00885d9774f63e8292641b491f6d9c52f83653696490
-
SSDEEP
98304:L6WUz+vUp6vdQDFUJ0t3an8NEaC+H89yM1dXLoarPDgIFZoP7cJcL4BM2s7D9:eWNcp6vdODt3a8OaC+H7YFPfDZoPgOL1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 33ab099d0a888a9ae66bcc8faf2b98f2d8563af2fe9685d34e65d66a37bd2437N
Files
-
33ab099d0a888a9ae66bcc8faf2b98f2d8563af2fe9685d34e65d66a37bd2437N.exe windows:6 windows x86 arch:x86
b84815e2c6fe51cf53fd1810d1921589
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetProcAddress
LoadResource
SizeofResource
LoadLibraryA
FindResourceA
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
WideCharToMultiByte
RaiseException
LoadLibraryExW
DecodePointer
MultiByteToWideChar
GetModuleHandleExW
FreeLibrary
ExitProcess
VirtualQuery
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
GetSystemTimeAsFileTime
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
Sleep
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameW
msvcrt
_clearfp
log10
sin
cos
_fileno
fflush
_isatty
___lc_codepage_func
?terminate@@YAXXZ
_msize
?_set_new_mode@@YAHH@Z
_acmdln
_ismbblead
__getmainargs
__set_app_type
_XcptFilter
sqrt
wctomb_s
strtol
strnlen
wcsnlen
tolower
__pctype_func
_iob
_unlock
_lock
_errno
free
strlen
strcpy_s
abort
_controlfp_s
__p__commode
_set_fmode
_initterm_e
_initterm
malloc
_callnewh
rand_s
ceil
_amsg_exit
_except_handler4_common
strrchr
strcat_s
_wmakepath_s
_wsplitpath_s
wcscpy_s
memset
memmove
__CxxFrameHandler3
_CxxThrowException
memcpy
realloc
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 426KB - Virtual size: 426KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ